Attack Types Flashcards

1
Q

What is social engineering?

A

Social engineering is the process by which the attacker seeks to extract info from users by tricking them into helping the attacker. It’s very successful because it relies on human emotions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing?

A

Phishing is a type of social engineering conducted via electronic communications. It is an attempt to acquire sensitive info by pretending to be a trustworthy entity, typically via email. Phisher tries to persuade victim to perform a series of actions that provides access to confidential info. Phishing emails have gotten more sophisticated, but user education is the best defense against this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spear phishing?

A

Spear phishing is a targeted form of phishing, often aimed at a specific individual. In contrast, phishing often involves mass emailing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is whaling?

A

Whaling is almost identical to spear phishing, except it goes after high profile targets like executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is vishing?

A

AKA voice phishing. Attacker uses a fake caller ID to appear as a trusted organization and attempts to get the individual to enter account details over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is smishing?

A

AKA SMS phishing. Attack that uses phishing methods via text messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pharming?

A

Pharming redirects the victims to a fake website, even if user enters the correct website url. This is typically possible via another attack, such as DNS cache poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tailgating?

A

Tailgating involves piggybacking or following closely behind someone who has authorized physical access within an environment. It also involves appearing to be a part of an authorized group or capitalizing on people’s desires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a mantrap?

A

It’s an airlock-like mechanism that allows one one person to pass at a time. It’s intended to provide entrance control and prevent tailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is impersonation?

A

A method in which someone assumes the character or appearance of someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is dumpster diving?

A

The act of scavenging for discarded equipment and documents in the trash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shoulder surfing?

A

Looking over one’s shoulder to obtain information. Prevention of this is user awareness, but can be assisted by mirrors or screen overlays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are hoaxes harmful?

A

Hoaxes present a threat that does not actually exist at face value. The real harm is in the response to the hoax, which can create unnecessary fear and irrational behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a watering hole attack?

A

Similar to spear fishing but instead of using email, the attacker attacks a site that the target frequently visits. The goal is to compromise the larger environment, such as the company the target works for. These attacks are commonly used in conjunction with a zero-day exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the principles of influence that a social engineer might use

A
  1. Authority
  2. Intimidation
  3. Consensus/social proof
  4. Scarcity/ urgency
  5. Familiarity/liking
  6. Trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spoofing?

A

Spoofing is a method of providing false identity info to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does IP and MAC spoofing work?

A

IP spoofing is where the attacker modifies the source address of traffic or the source of info. Attacker can pretend to be the system of of a forged io address. Similarly, MAC spoofing can forge a MAC address and potentially gain access control.
**IP spoofing seeks to bypass IP address filters by setting up a connection from a client and sourcing the packets with an IP address that is allowed through the filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between blind and informed spoofing?

A

Blind spoofing is where the attacker sends data and only makes assumptions of responses. Informed spoofing is where an attacker can participate in a session and can monitor the bidirectional communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a buffer overflow?

A

Occurs when data given to an application or service exceeds the storage space that was allocated in memory for that app/service. The overflow of input data must be discarded or somehow handled by the application. A buffer overflow can cause data or memory storage to be overwritten, result in a denial of service, and an originator can execute arbitrary code at a privilege level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an integer overflow?

A

A type of overflow that is specific to whole numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is privilege escalation?

A

Gaining special privileges through a programming error or oversight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a zero-day attack?

A

AKA zero hour or day zero attack. It’s an attack that tries to exploit computer app vulnerabilities that are unknown to others or even the software developer. Uses Zero-day exploits, which are software that uses a security hole to carry out an attack. Zero-day vulnerabilities do not have a patch available yet and are not detected by anti-malware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is cross-site scripting (XSS)?

A

A type of code injection where malicious script is placed client-side on a website. An attacker can cause an unknowing user to conduct unauthorized access activities, expose confidential data, and log successful attacks back to the attacker without being aware. XSS vulnerabilities can be used to hijack the user’s session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is cross-site request forgery (CSRF or XSRF)?

A

Attack that causes end users to execute an unwanted action on a site they are already logged into (currently authenticated).

25
Q

What is SQL injection?

A

Malicious code is inserted into strings that are later passed to a database server. The server then parses and executes the code.

26
Q

What is a DLL injection?

A

DLL (dynamic link libraries) injection inserts malicious code into a running process. It works by hooking the legitimate running process into the malicious DLLs and then running them.

27
Q

What is URL hijacking (aka typo squatting)?

A

Typo squatting relies on typographic errors users make on the Internet.

28
Q

What is domain hijacking?

A

It’s when the domain is taken over without the original owner’s knowledge or consent. Can occur when domain expires, but typically occurs via direct attacks due to security issues.

29
Q

What is clickjacking?

A

When an attacker can hijack clicks by taking advantage of browser vulnerabilities. It allows the attacker to redirect clicks or keystrokes to something the user does not expect.

30
Q

What is session hijacking?

A

Attackers steal a session cookie to gain access to that site.

31
Q

What is a man-in-the-middle attack?

A

It’s when an attacker intercepts traffic and either eavesdrops on traffic or alters it. The attacker tricks both parties into thinking they are communicating with each other. These attacks are possible due to the TCP handshake process. These attacks are not as prevalent due to prevention techniques, but man in the browser attacks have increased. MITB attack is a Trojan that infects web browser components such as plug-ins and helper objects.

32
Q

What is a replay attack?

A

Replay attacks use sniffers to capture packets and extract pertinent information. After extraction, the packets are returned to the network.

33
Q

What is a pass-the-hash attack?

A

The attacker gains access to the cryptographic hash and can pass this hash value to a system for authentication. The. Attacker does not need the actual password.

34
Q

What is ARP poisoning?

A

ARP poisoning is when an attacker broadcasts a fake or spoofed ARP reply to an entire network and poison all computers. ARP does not require validation. When ARP requests are sent, the requesting devices believe the incoming ARP replies are from the correct devices. This makes it possible for perpetrators ti trick a device into thinking any IP address is related to any MAC address.

35
Q

What is DNS poisoning?

A

When an attacker redirects traffic by changing the IP record for a specific domain, allowing attackers to send legitimate traffic anywhere they choose. It also caches this info for a short period, distributing the attack’s effect to server users. AKA DNS cache poisoning

36
Q

What is the difference between an authoritative and recursive DNS server?

A

Both DNS servers share information, but the difference is that recursive servers maintain info in cache. This means recursive servers can answer queries for resource records even if it can’t resolve the request directly. **An open-recursive DNS server responds to any lookup request without checking where it originates.

37
Q

How does a DoS work?

A

Usually a DoS involves flooding a listening port on your machine with packets. The idea is to make your system so busy processing the new connections that it cannot process legit service requests. It’s executed by manipulating protocols.

38
Q

DoS: What is smurf/smurfing?

A

Based on Internet Control Message Protocol (ICMP) reply function, AKA ping command. Attacker sends ping packets to the broadcast address of network and replaces original source address with source address of victim. Causes flood of traffic to the unsuspecting device.

39
Q

DoS: What is a fraggle?

A

It’s an attack that’s similar to a Smurf attack, but instead of using ICMP it uses UDP. The spoofed UDP packets are directed to port 7 (echo) or port 19 (chargen). A character generator attack can run when connected to port 19.

40
Q

DoS: What is ping flooding?

A

An attack that tries to block service or reduce activity on a host by sending ping requests directly to the victim. **Ping of death is when the packet size is too large and the system does not know how to handle the packets.

41
Q

DoS: What is a SYN flood?

A

Attack where the source system sends a flood of SYN requests but never sends the final ACK. This leaves the TCP session half-open and since the TCP stack waits before resetting the port, the attack overflows the destination computer’s connection buffer. This makes impossible to service connection requests from valid users.

42
Q

DoS: What is a land attack?

A

It’s where an attacker spoofs a TCP/IP SYN packet to the victim system with the same source and destination IP address and same source and destination ports. This creates confusion for the system as it tries to respond to the packet.

43
Q

DoS: What is a teardrop attack?

A

This attack targets a known behavior of UDP in the TCP/IP stack of some OS. It sends fragmented UDP packets to the victim with odd offset values in subsequent packets. When OS tries to rebuild the original packets, the fragments overwrite each other. This causes confusion and likely crash the system.

44
Q

What is a Distributed Denial of Service (DDoS)?

A

The attacker distributes zombie software that gives the attacker partial or full control of the infected computer system. The attacker does this by creating masters (computers running the client software), which then create zombies. The software running on the zombies can launch multiple types of attacks. When enough systems are compromised with zombie software, they can launch an attack from a wide variety of hosts. The attacks are DoS attacks, but the effects are multiplied from total number of zombies (resulting in DDoS).

45
Q

DoS: What is the difference between reflection and amplification?

A

Reflection is where the attacker takes advantage of legitimate third-party services (DNS, network time, etc) and the source address is spoofed to be that of the victim’s. Any replies from the service will be directed at the victim and hiding the attacker’s identity.
Amplification is where the attack is magnified, increasing the amount of traffic sent to the victim.

46
Q

How does a brute force attack work?

A

It uses cryptoanalysis or algorithms capable of performing exhaustive key searches. This type of attack can quickly crack a simple password, but can take a lot more time and power on complex passwords. This is because it attempts to exhaust all possible combinations of letters, numbers, and symbols.

47
Q

What is a hybrid attack?

A

This attack uses the dictionary attack method of using every word in a dictionary to gain access, but includes numbers at the end of word, substituting numbers for letters, capitalizing first letters.

48
Q

How does a birthday attack work?

A

A birthday attack finds collisions within hash functions, resulting in a more efficient method of brute-forcing one-way hashes. It gets its name from the birthday paradox.

49
Q

What is a rainbow table?

A

It’s essentially a large set of precomputed hash values for every possible combination of characters. An attacker can use this to efficiently crack hashed passwords. Best practice to prevent this is to lock accounts after several attempts (online attacks).

50
Q

What is a known plain-text attack (KPA)?

A

KPA is an attack that involves having a corresponding piece of both the plain text and cipher text. Having a single word or phrase match can reveal more information.

51
Q

How does a downgrade attack occur?

A

It typically results from security configurations not being updated, usually from the desire for backwards compatibility.

52
Q

What are countermeasures to weak implementation and password-based attacks?

A

Multifactor authentication is an important countermeasure. This can include combing something you know (password) with something you have (one time use token or code sent to your phone). Password hashes can also use a “salt”. Salting adds a prefix of a random string of characters to passwords before they are hashed. This makes the hash more random and difficult for an attacker to crack unless they know the value of the salt that needs to be removed.

53
Q

What is a sniffer (wireless)?

A

A hardware or software device capable of capturing the data or packets that traverse across the wireless channel. When traffic being sent across the network is unencrypted, packet sniffing enables the attacker to capture data and decode it.

54
Q

What is a rogue access point?

A

It’s where an unauthorized wireless access point has been set up. They can also serve as an “evil twin”. An evil twin is a type of MITM attack where the hijacker acts as an access point to the client and also acts as a client to the true network access point.

55
Q

How can you detect a rogue access point?

A

Wireless sniffing applications are commonly used to detect rogue ap’s. Companies can also employ wireless site surveys, which during the process will look for rogue ap’s because they can negatively impact not just security, but also QoS on the network.

56
Q

How does an IV attack occur?

A

An IV is an input to a cryptographic algorithm, essentially a random number. Ideally it should be unique and unpredictable, if it’s not, it has a high probability of being repeated after a small number of packets. This makes it more prone to attacks (too short/predictable).

57
Q

Wi-fi Protected Setup (WPS)

A

WPS should be always be disabled. Additionally, a firmware may be required to completely disable it.
This is due to a severe security vulnerability that was found in 2011 (pin can easily be cracked within hours via brute-force attacks).

58
Q

What is the difference between bluejacking and bluesnarfing?

A

Bluejacking is when a device connected to Bluetooth receives texts and messages broadcasting spam sent from a nearby Bluetooth-enabled device. These messages appear to come from the user’s device, leading the user to follow prompts and establish a connection to the attackers device.
Bluesnarfing is a more aggressive attack. When paired with the attacker’s device, the user’s data becomes available for unauthorized access, modification, or deletion.

59
Q

What is the difference between Near Field Communication (NFC) and Radio Frequency Identification (RFID)?

A

NFC is based on RFID protocols. NFC provides peer-to-peer communication, which is different from RFID devices. RFID requires a tag (active or passive) and a reader, but an NFC chip functions as both a reader and a tag.